Secure State Estimation for Cyber-Physical Systems Against Active Eavesdropping Attacks: A Stochastic Encryption-Based Method

被引:0
|
作者
Tao, Fei [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Eavesdropping; Estimation error; Intelligent sensors; Channel estimation; State estimation; Sensor phenomena and characterization; Cyber-physical systems; state estimation; active eavesdropping attacks; stochastic encryption-decryption; COMMUNICATION;
D O I
10.1109/TASE.2024.3457903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is concerned with the problem of remote state estimation for cyber-physical systems (CPSs) in the presence of an active eavesdropper. To prevent information leakage, a novel stochastic encryption scheme is proposed to protect the data transmitted via packet loss channel. The scheme can guarantee the user's privacy and force the estimation error of the eavesdropper to diverge by using a predefined scheduling sequence to transmit raw data or an encrypted version randomly. In this case, two types of data are considered: raw measurements and local estimates. Aiming at these two transmission scenarios, the expected estimation error recursions with respect to encryption mechanisms, channel parameters, and the system dynamics are derived in the minimum mean error estimation sense. Further, we show the conditions that require the expected estimation error covariance of the user to be bounded, while the active eavesdropper's expected estimation error grows unbounded by mathematical induction and matrix theory methods. Finally, an application example is illustrated to verify the performance of the encryption scheme.
引用
收藏
页码:6998 / 7007
页数:10
相关论文
共 50 条
  • [31] Secure iterative interval estimation method for cyber-physical systems subject to stealthy deception attacks
    Zhang, Tu
    Zhang, Guobao
    Huang, Yongming
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (06) : 1084 - 1092
  • [32] Secure nonlinear fusion estimation for cyber-physical systems under FDI attacks
    Weng, Pindi
    Chen, Bo
    Liu, Shichao
    Yu, Li
    AUTOMATICA, 2023, 148
  • [33] Resilient and secure remote monitoring for a class of cyber-physical systems against attacks
    Ge, Xiaohua
    Han, Qing-Long
    Zhang, Xian-Ming
    Ding, Derui
    Yang, Fuwen
    INFORMATION SCIENCES, 2020, 512 : 1592 - 1605
  • [34] Resilient Control of Stochastic Cyber-Physical Systems Against Stealthy Attacks: Complex Dynamical Networks Encryption Strategy
    Wang, Jun-Lan
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2025, 55 (02): : 1078 - 1091
  • [35] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [36] Secure State Estimation for Cyber-Physical Systems Under Sensor Attacks: A Satisfiability Modulo Theory Approach
    Shoukry, Yasser
    Nuzzo, Pierluigi
    Puggelli, Alberto
    Sangiovanni-Vincentelli, Alberto L.
    Seshia, Sanjit A.
    Tabuada, Paulo
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (10) : 4917 - 4932
  • [37] SECURE DISTRIBUTED ESTIMATION IN CYBER-PHYSICAL SYSTEMS
    Khan, Usman A.
    Stankovic, Aleksandar M.
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 5209 - 5213
  • [38] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [39] Analysis of Replay Attacks With Countermeasure for State Estimation of Cyber-Physical Systems
    Guo, Haibin
    Sun, Jian
    Pang, Zhong-Hua
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (01) : 206 - 210
  • [40] Lasso-based state estimation for cyber-physical systems under sensor attacks
    Cerone, V.
    Fosson, S. M.
    Regruto, D.
    Ripa, F.
    IFAC PAPERSONLINE, 2024, 58 (15): : 163 - 168